WIB Mini-Seminar, The Hague (21 st of March 2013) An update from the Control Systems Working Group
|
|
- Phillip Bennett Hudson
- 8 years ago
- Views:
Transcription
1 WIB Mini-Seminar, The Hague (21 st of March 2013) An update from the Control Systems Working Group Kees Biesheuvel, DOW Product Manager MOD5 Engineering Solutions Jos Menting, Laborelec Belgium, CTO
2 The merger of two WIB Working Groups BPCS Working Group Plant Security Working Group 2013 Control Systems Working Group WIB
3 Who is active in the Control Systems Working Group? 1. Eric Abresch - Exxonmobil 2. Ted Angevaare Shell & Chairman 3. Kees Biesheuvel - DOW 4. Lex Boekel - Wintershall 5. Pascal vd Boogaard Shell 6. Guido de Bouver - M+W-group 7. Fabien Briere - Total (Fr) 8. Maarten de Caluwe DOW 9. Lion Demarteau - Sitech 10. Jimmy Denis - Laborelec 11. Ruud Denneman - Total 12. Mahdi Elkawafi - Wintershall 13. Sierk Goedemoed Heineken 14. Dominic de Kerf - Cargill 15. Michiel Kleisen - Dupont 16. Tom Koeken - EdeA 17. Peter Kwaspen Shell 18. Patrick Lienart - Total (Fr) 19. Mart Louisse - Aramco 20. Joris Meijs - AkzoNobel 21. Jos Menting Laborelec & Board 22. Onno Moret - Wintershall 23. Jos Oelers - Sabic 24. Kevin Orr - Solar Turbines 25. Frank Pijnenburg - DSM 26. Joost Roldaan - Heineken 27. Chris Sandford Wurldtech (Guest Mem) 28. Andre Schepens - Dow 29. Frans Staes - Cargill 30. Maximilien Simons - Solvay 31. Gerard Valkema - AkzoNobel 32. Edwin Vandeneynde - Solvay 33. Anneke Vemer - Exxonmobil 34. Lou Verhagen - AkzoNobel 35. Martin Visser - Waternet 36. Dick de Wagenaar - Q8 37. Jos Wenmeckers EdeA (Alphabetic-order)
4 New Plan of Action: First a strategy document shall be produced to provide steer to the Control Systems Working Group: Strategy is the direction and scope of an organization over the long-term: which achieves advantage for the organization through its configuration of resources within a challenging environment, to meet the needs of markets and to fulfill stakeholder expectations : The following subject will be addressed in the strategy document: 1- Sharing knowledge 2- IT security 3- Obsolescence /Life Cycle 4- Common voice to vendors Plant Security 5- Migration The Control Systems Working Group will be active on technical subjects and not on financial/commercial subjects. Dedicated Task Forces will be create to deal with specific subjects in more detail and to work on the subject to create a deliverable, such as a document or a presentation.
5 WIB MISSION Facilitate exchange of experience and expertise amongst end-users and with vendors of C&A Provide requirements, selection and application guidance through independent evaluation Tom Kuperij Managing Director March 25,
6 The old WIB Plant Security Workgroup Mission Statement from 2007: 1. Mitigate the threats to industrial automation, measurement & control equipment and systems created by Cyber Security risks; 2. Main focus area will be to generate minimum standards or create references to minimum International Standards and Guidelines to allow the WIB members to speak with one voice to the industrial automation Vendors to allow them to improve their products and services; 3. Create metrics to measure the level of protection to cyber security threats; 4. Provide guidance to the WIB members in the certification of Process Control Security products and services; Ref.:
7 New Plan of Action: The following Task Forces have been created: Task Force: PCD Security Metrics Who: Ruud Denneman Typical Best Practice Architectures Lex Boekel / Maarten de Caluwe / Guido de Bouver Security Management Accreditation + Certification FAT-SAT PCD Security Standards + Guidelines Pro-Active Security Definitions to/from suppliers Tom Koeken / Frans Staes Frank Pijnenburg Pascal vd Boogaard (in combination with LOGIIC) Ted Angevaare Frans Staes Kees Biesheuvel Life Cycle Management Jos Oelers / Onno Moret / Frank Pijnenburg / Lou Verhagen = More details provided in this presentation
8 Typical Best Practice Architectures: Create best practice architecture per vendor (secure high availability high integrity for L1 and L2 (L3)) Define what is required to create a typical architecture. Decided is to ask vendors to present/supply their vision on secure architecture based on their products Vendor: Siemens Rockwell ABB Emerson Honeywell Invensys Hima General Electric Yokogawa Bentley Nevada PILZ Beckhoff RTP Who: Michiel Kleisen - Dupont Frans Staes - Cargill Martin Visser - Waternet Ted Angevaare - Shell Michiel Kleisen - Dupont Lou Verhagen - AkzoNobel Kees Biesheuvel - DOW Jos Menting - Laborelec Ted Angevaare - Shell Peter Kwaspen - Shell Frans Staes - Cargill Onno Moret - Wintershall Kees Biesheuvel - DOW
9 Evolution towards international standards: downloads DACA security standards and experiences Less than 50% content from ISO IDEAL standard is selection of relevant IT requirements from various standards WIB Report M 2784 X10, version 1 WIB Report M 2784 X10, version 2 IEC proposal International standard Cyber Security Procurement Language for Control Systems by DHS IEC
10 Current IEC framework: 10
11 IEC process and present status now 11
12 Business case of certification: 12
13
WIB Functional Safety
WIB Functional Safety From Interpretation to successful Implementation March 21, 2013 Leon Heemels Functional Safety workgroup Functional Safety workgroup Scope of this workgroup Participants Workgroup
More informationGlobal Industrial Cyber Security Professional GICSP
Global Industrial Cyber Security Professional GICSP A certification for Engineers, ICS Security Professionals, and ICS Technology Specialists ARC Industry Forum, Feb 10, 2014 SANS ICS Resources Control
More informationISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy
ISA Security Role of Product Certification in an Overall Cyber Security Strategy Tom Culling Chevron Andre Ristaino ASCI Kevin Staggs - Honeywell John Cusimano exida 1 ISA Security Agenda Who is the ISA
More informationISA Security Compliance Institute
ISA Security Compliance Institute Johan Nye Chairman ISCI Governing Board 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99 Standards 2013 ISCI
More informationISA Security Compliance Institute ISASecure IACS Certification Programs
ISA Security Compliance Institute ISASecure IACS Certification Programs This paper describes how international industrial cybersecurity standards and complementary conformance certification programs should
More informationKevin Staggs - CISSP February 2, 2009. Patch Management
Kevin Staggs - CISSP February 2, 2009 Patch Management Topics Our philosophy Advice to our customers Patch qualification and management How we support our customers Industry needs Resources Summary 2 Our
More informationRoadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
More informationVision & Positioning Statement For Wurldtech Labs
Vision & Positioning Statement For Wurldtech Labs Wurldtech Security Technologies s Industrial Cyber Security Solutions For Global Process Automation & Control System Stakeholders Presentation Purpose
More informationISA Security Compliance Institute
ISA Security Compliance Institute Andre Ristaino, Managing Director, ISCI 28 May 2013 CSSC 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99
More informationARC INDUSTRY FORUM 2015
ARC INDUSTRY FORUM PRESENTATION TOPIC: MANAGING INDUSTRIAL CYBER SECURITY RISK Tyler Williams Manager, Industrial Cyber Security Shell Global Solutions tyler.williams@shell.com 1 THE TRADITIONAL APPROACH
More informationSecurity Levels in ISA-99 / IEC 62443
Summary Assessment of the security protection of a plant A Security Protection Level has to be assessed in a plant in operation A Protection Level requires both: The fulfillment of the policies and procedures
More informationThe Group CYTEK CYTEK PROJECTS CONSULTING
Corporate Overview The Group CYTEK CYTEK PROJECTS CYTEK AUTOMATION CONSULTING Platform Independent Automation & Industrial IT Consultancy and Project Management Services Group since 1993 200 plus staff
More informationABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy
More informationCybersecurity & the Water Sector
Cybersecurity & the Water Sector NAWC Water Summit October 6, 2013 San Diego, CA Kevin Morley, AWWA How to deal with Cyber Threat? How would our operations change if we did not have SCADA working? How
More informationCybersecurity for Energy Delivery Systems 2010 Peer Review. Dale Peterson Digital Bond, Inc. Bandolier and Portaledge
Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 Dale Peterson Digital Bond, Inc. Bandolier and Portaledge Summary Slide: Bandolier Outcomes: Insure new and upgraded
More informationESKISP6056.01 Direct security testing
Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being
More informationChemical Sector Cyber Security Program
Chemical Sector Cyber Security Program Christine Adams, Director, Chemical Sector Cyber Security Program Neil Hershfield, Director, CIDX Cyber Security Initiative Cyber Security Program Leadership Executive
More informationFinancial Services Practice. Bridging the gap between business & technology
Financial Services Practice Bridging the gap between business & technology What we do 02 Purple allows its clients to have a single entity to manage its technology portfolio so that they can focus on achieving
More informationRethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group bmick@arcweb.com 1 Rethinking Cyber Security We Now Have Years of Experience - Security
More informationProcess Automation and Instrumentation Market by Types, Technology, Application and by Geography - Analysis & Global Forecasts to 2013-2020
Brochure More information from http://www.researchandmarkets.com/reports/2852831/ Process Automation and Instrumentation Market by Types, Technology, Application and by Geography - Analysis & Global Forecasts
More informationHarnessing the power of change ABB Automation & Power World March 2-5, 2015 Houston, TX. Curriculum for Harmony
Register today at www.abb.com/apw2015 Harnessing the power of change ABB Automation & Power World March 2-5, 2015 Houston, TX Curriculum for Harmony Monday, March 2 401101 Windows XP support: what to do
More informationAUTOMATION AND PROCESS CONTROL
AUTOMATION AND PROCESS CONTROL THE CONTROL TECHNOLOGY GROUP FAST GROUP Since 1982, the year in which it was established, FAST has represented a costant reference point on the international scene for supplies
More informationShared Infrastructure: What and Where is Collaboration Needed to Build the SM Platform?
Smart Manufacturing Forum Shared Infrastructure: What and Where is Collaboration Needed to Build the SM Platform? 10:45-11:45am panel discussion Moderator: John Bernaden, Vice Chair, Smart Manufacturing
More informationTeam A SaaS Strategy
Team A SaaS Strategy What is a strategy? Strategy is the direction and scope of an organization over the long-term term: : which achieves advantages for the organization through its configuration of resources
More informationDr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationProcess Automation - History and Future
Christer Rameback Vice President Process Automation Process Automation - History and Future ABB Automation Technology - 1 - Facts about ABB ABB Automation Technology - 2 A leading power and automation
More informationControl System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems
Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems James Goosby Manager I&C Systems and Field Support 19 th Annual ARC Industry Forum Agenda About Us Compliance
More informationTransforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil
Transforming Control System to a Virtualized Platform, including On Process Migration Anneke Vemer ExxonMobil ARC conference, Antwerp, 5-Mar-2013 Cleared ExxonMobil External Technical Publication 2013.1104
More informationApplying ISA/IEC 62443 to Control Systems MESAKNOWS. Graham Speake. Principal Systems Architect Yokogawa. Do you know MESA? Additional partner logos
Applying ISA/IEC 62443 to Control Systems Graham Speake Principal Systems Architect Yokogawa Additional partner logos MESAKNOWS SUSTAINABILITY & ECO EFFICIENCY LEAN METRICS & PERFORMANCE MANAGEMENT INFORMATION
More informationThe Open Group 2011. Cloud Work Group
The Open Group Cloud Work Group 18 May 2011 Heather Kreger SOA WG co-chair Liaison for SOA, Cloud IBM Cornwallis Rd B062, M307 Research Triangle Park, NC Tel 919-496-9572 Kreger@us.ibm.com www.opengroup.org
More informationIndustrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security Mike.spear@honeywell.com Responsible for the Global Delivery of Honeywell
More informationWhitepaper. Personnel Functional Safety Certification: Not All Programs Are Created Equal. Summary
Whitepaper Personnel Functional Safety Certification: Not All Programs Are Created Equal Summary As production runs ever closer to equipment and facility operating limits and new plants come on line in
More informationManage Release and Deployment
Manage Release and Deployment Description Once development is complete, new and enhanced services need to be made operational. Effective requires planning, scheduling and controlling the implementation
More informationCONSULTANCY. Initial Terms of Reference Outbreaks and Humanitarian Emergencies Supply Chain Development Project
CONSULTANCY Initial Terms of Reference Outbreaks and Humanitarian Emergencies Supply Chain Development Project This consultancy is requested by: Unit: Outbreaks & Humanitarian Emergencies (OHE) Department:
More informationISA99 Working Group 5 ISA99 Working Group 5
Date: May 14, 2015 Time: 11:00 ET US Lead: E. Cosman Notes: E. Cosman Distribution: ISA99 committee and stakeholders ISA99 Working Group 5 ISA99 Working Group 5 ISA 67 Alexander Drive PO Box 12277 Research
More informationRESPONSIBLE CARE GLOBAL CHARTER. A Special Supplement Presented with
RESPONSIBLE CARE GLOBAL CHARTER A Special Supplement Presented with GLOBAL CHARTER INTRODUCTION 4 ELEMENTS OF THE GLOBAL CHARTER 5 CORE PRINCIPLES 6 FUNDAMENTAL FEATURES 6 SUSTAINABLE DEVELOPMENT 8 CONTINUOUS
More informationSession 14: Functional Security in a Process Environment
Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the
More informationIEC 61850 A New Perspective in Substation Automation
Sol Lindström IEC 61850 A New Perspective in Substation Automation ABB Power Technologies All rights reserved. -1-5/4/2004 Towards a Global Solution for......substation Automation Systems Experience in:
More informationFundamentals for EHR Success
Fundamentals for EHR Success Angie Chew Monksfield Principal of Portfolio Lim Shih Hsien Deputy Director, Information Security Knowing the Pain Points This material contains information that is confidential
More informationRoles & Grades Rate Cards and Applicable SFIA Skills
Roles & s Rate Cards and Applicable Consultant Day Rate Card Consultant Day Rate Lead 900.00 Senior 800.00 Junior 0.00 CLAS Consultant and Competencies Lead CLAS Consultant Lead CLAS Consultant IT Governance
More informationN.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida nksrivastava@ntpceoc.co.in
N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida nksrivastava@ntpceoc.co.in JULY 2012 ARC- Transforming Industry and Infrastructure through New Processes and Technologies Presentation Road Map Introduction
More informationESKISP6046.02 Direct security architecture development
Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable
More informationTechnical Project Manager JOB DESCRIPTION
JOB TITLE: BUSINESS UNIT: REPORTS TO: Technical Project Manager ICT Manager, ICT EA GRADE: Non-EA Position DATE APPROVED: 17/12/2015 JOB SPECIFICATION SUMMARY OF THE BROAD PURPOSE OF THE JOB The Technical
More informationCyber security offensive and defensive strategies An Intelligent Utility Reality Webcast
Cyber security offensive and defensive strategies An Intelligent Utility Reality Webcast 10/15 10/29 January 7, 2010 1/28 Cyber security offensive and defensive strategies H. Christine Richards Vice President
More informationIndustrial Automation Automation Industrielle Industrielle Automation
1.1 Automation Overview automación - vista general Automation -vue d'ensemble Automation - Übersicht Automation Industrielle Industrielle Automation Definition Automation (automation, Automation): 1) set
More informationOE PROJECT CHARTER TEMPLATE
PROJECT : BearBuy Implementation PREPARED BY: Vanessa Wong and Jon Conhaim DATE (MM/DD/YYYY): 07/23/2011 PROJECT CHARTER VERSION HISTORY VERSION DATE COMMENTS (DRAFT, SIGNED, REVISED CURRENT STATUS) (MM/DD/YYYY)
More informationIndustrial Control System Cyber Security
2012 Honeywell Users Group Asia Pacific Sustain.Ability. Industrial Control System Cyber Security 1 Honeywell Process Solutions Cyber Security Architect Global Architect Team Mike Baldi Responsible for
More informationBUSINESS TO MANUFACTURING (B2M) COLLABORATION BETWEEN BUSINESS AND MANUFACTURING USING ISA-95 ABSTRACT
BUSINESS TO MANUFACTURING (B2M) COLLABORATION BETWEEN BUSINESS AND MANUFACTURING USING ISA-95 Dennis Brandl dennis.brandl@sequencia.com Sequencia Corporation ABSTRACT Integrating business and manufacturing
More informationCan Process Analyzers become part of the control loop?
Can Process Analyzers become part of the control loop? Cees Didden Workgroup Process Analyzers March 21th 2013 THE ANSWER IS YES End of this lecture? From : G. Stephanopoulos, Chemical Process Control,
More informationOE PROJECT CHARTER TEMPLATE
PROJECT : PREPARED BY: DATE (MM/DD/YYYY): Project Name Typically the Project Manager Project Charter Last Modified Date PROJECT CHARTER VERSION HISTORY VERSION DATE (MM/DD/YYYY) COMMENTS (DRAFT, SIGNED,
More informationAdvanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S
Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S making a difference in system integration Capula is a leading
More informationIt s about service. to clients to colleagues to community to country
It s about service It s about service to clients to colleagues to community to country Delivering business strategy and mission-critical IT solutions and services for nearly two decades. 1 Source is a
More informationGlobal Consulting Services Overview. Peter Fischer Manager, Global Consulting May 5, 2011
Global Consulting Services Overview Peter Fischer Manager, Global Consulting May 5, 2011 Overview Global Consulting Services at-a-glance Why Global Consulting Services Brief overview of current engagements
More informationInformation Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
More informationFOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
More informationSTATE BOARD OF ELECTIONS P.O. BOX 6486, ANNAPOLIS, MD 21401-0486 PHONE (410) 269-2840
MARYLAND STATE BOARD OF ELECTIONS P.O. BOX 6486, ANNAPOLIS, MD 21401-0486 PHONE (410) 269-2840 Bobbie S. Mack, Chairman David J. McManus, Jr., Vice Chairman Rachel T. McGuckian Patrick H. Murray Charles
More informationARC Industry Forum, Orlando 2/13/2014. Overview. Martin Swaine 4D Program Manager, Shell P&T (Projects & Technology) Shell International
ARC Industry Forum, Orlando 2/13/2014 Overview Martin Swaine 4D Program Manager, Shell P&T (Projects & Technology) Shell International 2001, CII Formed Fiatech Realize Best of What Is! Realize Best of
More informationARC VIEW. Invensys and Microsoft Join Forces to Deliver Cloud-Based Manufacturing Solutions. Keywords. Summary. By Peter Reynolds
ARC VIEW OCTOBER 25, 2012 Invensys and Microsoft Join Forces to Deliver Cloud-Based Manufacturing Solutions By Peter Reynolds Keywords Azure, BPM, Cloud Computing, Invensys Operations Management, Historian,
More informationLOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION
LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved
More informationISA-99 Industrial Automation & Control Systems Security
ISA-99 Industrial Automation & Control Systems Security Jim Gilsinn National Institute of Standards & Technology (NIST) Engineering Laboratory ISA99 Committee Addresses Industrial Automation and Control
More informationCyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
More informationFOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
More informationProviding Innovative Solutions
Control Panel Design & Manufacturing Systems Integration EXCELLENCE IS OUR STANDARD (281) 530-3248 INTRODUCTION RAN Technologies offers manufacturing of high quality customized panels for the industrial
More informationInternational Chamber of Commerce The world business organization
International Chamber of Commerce The world business organization ICC Cyber Security Guide for Business World Bank Seminar on Cyber Preparedness Vienna. 18 19 May 2015 Gerard Hartsink Chair ICC Task Force
More informationFOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
More informationA Tactical Approach to Continuous Compliance. Walt Sikora, Vice President Security Solutions EMMOS 2013
A Tactical Approach to Continuous Compliance Walt Sikora, Vice President Security Solutions EMMOS 2013 Abstract NERC has moved quickly to address shortcomings and lack of clarity in previous versions of
More informationDesign Document Version 0.0
Software Development Templates Design Document Version 0.0 Description of Project DOCUMENT NO: VERSION: CONTACT: EMAIL: Ivan Walsh DATE: 4/13/2004 Distribution is subject to copyright. Design Document
More informationProcess Control Systems Forum (PCSF)
Process Control Systems Forum (PCSF) Michael Torppey Technical Manager, PCSF Senior Principal, Mitretek Systems Collaborating to Advance Control System Security Background Department of Homeland Security
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationESCoRTS A European network for the Security of Control & Real Time Systems
ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in
More informationStandard for an Architectural Framework for the Internet of Things (IoT) IEEE P2413
Standard for an Architectural Framework for the Internet of Things (IoT) IEEE P2413 Oleg Logvinov Chair of the IEEE P2413 Working Group Chair of the IEEE Internet Initiative Chair if the Industry Engagement
More informationOffice of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
More informationEnergy sector control centers across the nation, such as this one at Kansas City Power & Light, benefit from the system security assessments
Energy sector control centers across the nation, such as this one at Kansas City Power & Light, benefit from the system security assessments performed through National SCADA Test Bed industry partnerships.
More informationDHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
More informationIs your current safety system compliant to today's safety standard?
Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before
More informationAnnexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description
Annexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description Position / Designation Program Manager Level / Rank Principal Consultant Educational Qualifications Experience
More informationCSMS. Cyber Security Management System. Conformity Assessment Scheme
CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme
More informationProject Team Roles Adapted for PAAMCO
Project Team Roles Adapted for PAAMCO Project Roles, Authority & Responsibilities Role a defined funciton assumed by or assigned to a person in the project Authority the right to apply project resources,
More informationCyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
More informationAvaya Strategic Communications. Consulting. A Strong Foundation for Superior Business Results. Table of Contents. Taking Business Vision to Reality
Avaya Strategic Communications Consulting Table of Contents Taking Business Vision to Reality... 1 Section 1: The Technology Contribution Challenge..... 1 Section 2: A Systematic Approach for Ensuring
More informationStrategic payment solutions
Strategic payment solutions About Eiger Systems Eiger Systems provides market leading software and services to meet the requirements of organisations implementing strategic payment solutions. We intentionally
More informationVoice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview
Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview 1/1 Table of Contents 1. Introduction...3 2. Executive Summary...4 3. Program Definition...5 3.1. Program
More informationTowards a standard approach to supply chain integrity. Claire Vishik September 2013
Towards a standard approach to supply chain integrity Claire Vishik September 2013 1 Draws from: ENISA s report on this topic Slawomir Gorniak, European Network and Information Security Agency Demosthenes
More informationA Guide to the Cyber Essentials Scheme
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
More informationData Governance Update. BOE workshop January 30, 2014
Data Governance Update BOE workshop January 30, 2014 IT Leadership Brett Miller, Chief Technology Officer Dave Reid, Director Enterprise Application Architecture Chris Paschke, Manager Information Security
More informationInformation Technology Project Management (ITPM)
FUNCTIONAL AREA 10 Project Management (ITPM) Incumbents in this functional area direct information technology system solution and/or improvement projects for cost, time, scope, risk, and quality. They
More informationDallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010
Dallas IIA Chapter / ISACA N. Texas Chapter Auditing Tuesday, October Project 20, 2009 Management Controls January 7, 2010 Table of Contents Contents Page # Project Management Office Overview 3 Aligning
More informationProtecting productivity with Plant Security Services
Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services
More informationDevelopment, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
More informationResilient and Secure Solutions for the Water/Wastewater Industry
Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Cyber Security IT People Geeks How
More informationMNLARS Project Audit Checklist
Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?
More informationTERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
More informationNGITS ITSM STRATEGY JAYASHREE RAGHURAMAN SHIVA CHANDRASHEKHER VIKAS SOLANKI
NGITS ITSM STRATEGY JAYASHREE RAGHURAMAN SHIVA CHANDRASHEKHER VIKAS SOLANKI AGENDA JAYASHREE 1. Introduction 2. Problem Statement 3. Recommendations 4. Organization Structure 5. Roadmap 6. Cost Benefit
More informationCyber Security Health Test
ENERGY Cyber Security Health Test Robin Massink 20-05-2014 1 DNV GL 2013 2014 20-12-2013 SAFER, SMARTER, GREENER Cyber security issues facing the utility industry We are moving from IEC60870-5-101/ DNP3
More informationintegrate 2: Business Process Redesign
Nevada System of Higher Education integrate 2: Business Process Redesign Executive Summary TABLE OF CONTENTS I. BACKGROUND AND OBJECTIVES 2 II. METHODOLOGY AND APPROACH 3 III. PROJECT OUTCOMES 5 IV. MAJOR
More informationBuilding the business case for ITAM
Building the business case for ITAM Executive summary An ITAM Review reader asked: What data do I need to collect to show the value of my ITAM practice? This article attempts to answer that question, from
More informationFront End Engineering Design Capabilities
Front End Engineering Design Capabilities Why EMERSON? Aligning your project and business objectives while creating a solid, detailed project foundation begins with a Front End Engineering Design (FEED)
More information1 ISA Security Compliance Institute
1 ISA Security Compliance Institute Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/ IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations
More informationHistorians and Production Management as Cloud Applications
Historians and Production Management as Cloud Applications Harry Forbes Senior Analyst ARC Advisory Group hforbes@arcweb.com Emerging Technologies Enable Information- Driven Manufacturing Big Data Analytics
More information